Filename Size 01 - Managing vulnerabilities with Nessus.en.srt 2.1 KB 01 - Managing vulnerabilities with Nessus.mp4 23.8 MB 02 - What you need to know.en.srt 1.2 KB 02 - What you need to know.mp4 1 MB 03 - Nessus editions.en.srt 4.4 KB 03 - Nessus editions.mp4 6.4 MB 04 - Installing Nessus Manager on Linux.en.srt 4.3 KB 04 - Installing Nessus Manager on Linux.mp4 3.9 MB 05 - Installing Nessus Manager on Windows.en.srt 5.5 KB 05 - Installing Nessus Manager on Windows.mp4 8.2 MB 06 - Accessing the Nessus console.en.srt 3.5 KB 06 - Accessing the Nessus console.mp4 3.6 MB 07 - What is vulnerability management.en.srt 6.1 KB 07 - What is vulnerability management.mp4 8.3 MB 08 - Identify scan targets.en.srt 6.6 KB 08 - Identify scan targets.mp4 8.9 MB 09 - Scan frequency.en.srt 6.1 KB 09 - Scan frequency.mp4 11.9 MB 10 - Scan configuration.en.srt 6 KB 10 - Scan configuration.mp4 10.4 MB 11 - Scan perspective.en.srt 6.5 KB 11 - Scan perspective.mp4 7.2 MB 12 - Scanner maintenance.en.srt 6.6 KB 12 - Scanner maintenance.mp4 4.6 MB 13 - Vulnerability Scanning Tools.en.srt 2.8 KB 13 - Vulnerability Scanning Tools.mp4 4.5 MB 14 - Report scan results.en.srt 8 KB 14 - Report scan results.mp4 9.7 MB 15 - Prioritize remediation.en.srt 7.3 KB 15 - Prioritize remediation.mp4 7.5 MB 16 - Create a remediation workflow.en.srt 7.1 KB 16 - Create a remediation workflow.mp4 5.7 MB 17 - Barriers to vulnerability remediation.en.srt 8.8 KB 17 - Barriers to vulnerability remediation.mp4 13.7 MB 18 - SCAP.en.srt 4.5 KB 18 - SCAP.mp4 4.2 MB 19 - CVSS.en.srt 5 KB 19 - CVSS.mp4 4.3 MB 20 - Interpreting CVSS scores.en.srt 5.2 KB 20 - Interpreting CVSS scores.mp4 7.9 MB 21 - Analyzing scan reports.en.srt 7.5 KB 21 - Analyzing scan reports.mp4 8.3 MB 22 - Correlating scan results.en.srt 4.5 KB 22 - Correlating scan results.mp4 4.4 MB 23 - Server vulnerabilities.en.srt 9.4 KB 23 - Server vulnerabilities.mp4 13.1 MB 24 - Endpoint vulnerabilities.en.srt 3.1 KB 24 - Endpoint vulnerabilities.mp4 6.8 MB 25 - Network vulnerabilities.en.srt 8.7 KB 25 - Network vulnerabilities.mp4 6.6 MB 26 - Virtualization vulnerabilities.en.srt 4.9 KB 26 - Virtualization vulnerabilities.mp4 3.7 MB 27 - Industrial control systems.en.srt 8.1 KB 27 - Industrial control systems.mp4 11.3 MB 28 - Understanding cross-site scripting.en.srt 10 KB 28 - Understanding cross-site scripting.mp4 12.9 MB 29 - Preventing SQL injection.en.srt 9 KB 29 - Preventing SQL injection.mp4 9.3 MB 30 - Next steps.en.srt 947 B 30 - Next steps.mp4 1.2 MB Udemy Course downloader.txt 94 B